scispace - formally typeset
Open AccessJournal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

Gerrit C. Langelaar, +2 more
- 01 Jan 2000 - 
- Vol. 17, Iss: 5, pp 20-46
Reads0
Chats0
TLDR
The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Abstract
The authors begin by discussing the need for watermarking and the requirements. They go on to discuss digital watermarking techniques based on correlation and techniques that are not based on correlation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Optimal Signature Design for Spread-Spectrum Steganography

TL;DR: This work derives jointly optimal signature and linear processor designs for SS embedding in linearly modified transform domain host data and demonstrates orders of magnitude improvement over current SS steganographic practices.
Journal ArticleDOI

Digital image forgery detection: a systematic scrutiny

TL;DR: This systematic survey is to gain insights into the current research on the detection of digital image forgeries by comprehensively analysing the selected studies in order to answer a predefined set of research questions.
Journal ArticleDOI

Wavelet Based Image Watermarking: Futuristic Concepts in Information Security

TL;DR: The state-of-art of the various wavelet based image watermarking techniques in spatial as well as in transform domain based on the robustness, imperceptibility, capacity and security are reviewed.
Journal ArticleDOI

LDFT-Based Watermarking Resilient to Local Desynchronization Attacks

TL;DR: Simulation results show that the proposed watermarking scheme can survive numerous kinds of distortions, including common image-processing attacks, local and global DAs, and noninvertible cropping.
Journal ArticleDOI

Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition

TL;DR: Experimental results demonstrate that in addition to achieving a great imperceptibility, large capacity and sufficient security, the proposed scheme obtains a satisfactory level of robustness against image processing and geometrical attacks, simultaneously.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Image coding based on a fractal theory of iterated contractive image transformations

TL;DR: The author proposes an independent and novel approach to image coding, based on a fractal theory of iterated transformations, that relies on the assumption that image redundancy can be efficiently exploited through self-transformability on a block-wise basis and approximates an original image by a Fractal image.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.